News
Red Cross Cyberattack Compromises Highly Vulnerable People’s Data
In a particularly low blow, a Red Cross cyberattack compromised personal data and confidential information of more than 515,000 highly vulnerable...
Darkest Before The Dawn: Expectations For The Year Ahead
With transition comes turbulence. Never has this been more obvious and widespread than with IT infrastructures over the last 18 months. Remote work,...
Data Privacy: What Technologists Should Know in 2022
Ever since EU lawmakers enacted the block’s groundbreaking General Data Protection Regulation (GDPR) framework in May 2018, data privacy laws have...
A Cybersecurity Checklist for the New Year
When it comes to a cybersecurity checklist, admittedly you could have just a single item on your list: Identify your risks and mitigate them. In...
Cloud Migration, Zero-Trust Architecture and Ransomware: The Year Ahead
IT infrastructure has been in a period of intense transition, exacerbated widely by the global disruptions brought on by the events of the past two...
Are You Ready for These 2022 Cyber Threats?
A new year, a new set of cyber threats. Are you prepared? The only thing we know for sure is that cybercriminals will never stop. In this article,...
Tech Predictions for 2022: Cloud, Data, Cybersecurity, AI, and More
You might think it foolhardy to make predictions about something that changes as furiously fast as emerging technology. Driven by massive...
Twitch 2021: A year in controversies
2020 was a noteworthy year for big streamer bans on Twitch, but 2021 has been something different. In many ways, the past 12 months have been much...
Threat modeling and DevOps: A partnership in the making
Thinking through all the potential threats against an application must start in development. Threat modeling is a structured process that enables IT...